i3 4130 ve GTX 1050 sistemde mavi ekran ve ısınma

cesur4161

Hectopat
Katılım
1 Haziran 2017
Mesajlar
46
Daha fazla  
Cinsiyet
Erkek
İyi forumlar.

Bilgisayarımdaki neredeyse tüm oyunlar ya crash verip kapanıyor ya da hatasız kapanıyor. Dün gece oynadığımda hiçbir problem olmayan Farm Together bugün hata verdi. CS:GO, Forest, ETS 2 vs bütün oyunlarda aynı problemleri yaşıyorum.

RAM testi, harddisk testi, CPU Benchmark yaptım sorun gözükmüyor. Ekran kartını da garantiye gönderdim onda da problem yokmuş.
  • i3 4130
  • 8 GB RAM
  • GTX 1050
  • 1TB harddisk
Ve ısınma var, boştayken bile 60-70° arası işlemcim.
 
Son düzenleyen: Moderatör:
 
Bende de aynı sorun olmuştu. Ekran kartı driverını silip başka bir sürüm yükler misin?

Deneyeceğim.


minidump.zip buyurun.
 
Geçici bir süreliğine Avast kaldır.

Intel grafik birimi(Intel ekran kartı) sürücüsü neden yüklü?

Ağ sürücülerini güncelle.

Bellek ve HDD testini ne ile yaptın?

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8034489f58e, Address of the instruction which caused the bugcheck
Arg3: ffffc98265612dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8034489f58e

BUGCHECK_P3: ffffc98265612dd0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpCaptureHandleInformation+8e
fffff803`4489f58e 410fb64118      movzx   eax,byte ptr [r9+18h]

CONTEXT:  ffffc98265612dd0 -- (.cxr 0xffffc98265612dd0)
rax=0000000000000000 rbx=ffffe08da7c060a0 rcx=0000000000000000
rdx=0000000000000030 rsi=ffffe08da7c060a0 rdi=0000000000001028
rip=fffff8034489f58e rsp=ffffc982656137c8 rbp=ffffe08dacc57e40
 r8=0000000000000000  r9=0000000000000000 r10=000000000018a3d0
r11=ffffc98265613810 r12=ffff9f7a73c00050 r13=ffffc982656138c0
r14=fffff8034489f500 r15=000000000032db48
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ObpCaptureHandleInformation+0x8e:
fffff803`4489f58e 410fb64118      movzx   eax,byte ptr [r9+18h] ds:002b:00000000`00000018=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:01.0851

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8034490cbe9 to fffff8034489f58e

STACK_TEXT: 
ffffc982`656137c8 fffff803`4490cbe9 : 00000000`00001028 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e
ffffc982`656137d0 fffff803`4490a475 : fffff803`4489f500 ffffe08d`acc57e58 ffffc982`0032db48 00000000`0032db48 : nt!ExpSnapShotHandleTables+0x131
ffffc982`65613860 fffff803`447aa218 : 00000000`106db050 fffff803`00020000 ffffcb0b`0018a3d0 ffff9f7a`73c00050 : nt!ExpGetHandleInformation+0x71
ffffc982`656138b0 fffff803`445e150b : 00000000`0032db60 00000000`00000000 00000000`00000010 00000000`106db050 : nt!ExpQuerySystemInformation+0x1c8be8
ffffc982`65613ac0 fffff803`441d3251 : ffffcb0b`00000000 00000000`00000001 00000000`00000001 ffffc982`65613b80 : nt!NtQuerySystemInformation+0x2b
ffffc982`65613b00 00007ffe`d9b9c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`092de2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d9b9c784


THREAD_SHA1_HASH_MOD_FUNC:  74d5022b6d70ac2b757be0cd92beda5707d667cf

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e28480b959efa983b7179027260dc7953695a1cf

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!ObpCaptureHandleInformation+8e
fffff803`4489f58e 410fb64118      movzx   eax,byte ptr [r9+18h]

FAULT_INSTR_CODE:  41b60f41

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCaptureHandleInformation+8e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffc98265612dd0 ; kb

BUCKET_ID_FUNC_OFFSET:  8e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpCaptureHandleInformation

TARGET_TIME:  2020-02-07T13:57:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  34f7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpcapturehandleinformation

FAILURE_ID_HASH:  {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
---------


CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff80823b9f6240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff80823b9f6240

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text>

ERROR_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text>

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:05.0401

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff806616cb1e9 to fffff80660fc1510

STACK_TEXT: 
ffff9609`0d867938 fffff806`616cb1e9 : 00000000`000000ef ffff8082`3b9f6240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff9609`0d867940 fffff806`615c7893 : ffff8082`3b9f6240 fffff806`60e9c769 ffff8082`3b9f6240 fffff806`60e9c8c0 : nt!PspCatchCriticalBreak+0x115
ffff9609`0d8679e0 fffff806`6143a190 : ffff8082`00000000 00000000`00000000 ffff8082`3b9f6240 ffff8082`3b9f6240 : nt!PspTerminateAllThreads+0x175cbf
ffff9609`0d867a50 fffff806`61439f79 : ffffffff`ffffffff ffff9609`0d867b80 ffff8082`3b9f6240 fffff806`61154301 : nt!PspTerminateProcess+0xe0
ffff9609`0d867a90 fffff806`60fd3351 : 0000007b`00000414 ffff8082`3b9c7080 ffff8082`3b9f6240 00000000`00000000 : nt!NtTerminateProcess+0xa9
ffff9609`0d867b00 00007ffe`dbdfc644 : 00007ffe`dbdccef2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000007b`86eff778 00007ffe`dbdccef2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdfc644
0000007b`86eff780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdccef2


THREAD_SHA1_HASH_MOD_FUNC:  e8c9407148d94b0ae6496e94a8a56eccd3d66cf5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  379d05474c8eb0dc5e34b0f2c3904c1f681e675d

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PspCatchCriticalBreak+115
fffff806`616cb1e9 cc              int     3

FAULT_INSTR_CODE:  ed8440cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak

BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak

PRIMARY_PROBLEM_CLASS:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak

TARGET_TIME:  2020-03-03T14:43:12.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  c23

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xef_svchost.exe_bugcheck_critical_process_3b9c7080_nt!pspcatchcriticalbreak

FAILURE_ID_HASH:  {c7ccb047-8cac-abab-d6dd-0041765eac8c}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc486141e3030, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc486141e2f88, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc486141e3030

BUGCHECK_P3: ffffc486141e2f88

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc486141e3030 -- (.trap 0xffffc486141e3030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf8bb3e89e40 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffaf8bb0cdc210 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80655102168 rsp=ffffc486141e31c8 rbp=ffffc486141e32d0
 r8=000000000000008e  r9=ffffaf8bb0c98e40 r10=000000000000010e
r11=00000000000000e1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlEnumerateEntryHashTable+0x108:
fffff806`55102168 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc486141e2f88 -- (.exr 0xffffc486141e2f88)
ExceptionAddress: fffff80655102168 (nt!RtlEnumerateEntryHashTable+0x0000000000000108)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:09.0089

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff806551d33e9 to fffff806551c1510

STACK_TEXT: 
ffffc486`141e2d08 fffff806`551d33e9 : 00000000`00000139 00000000`00000003 ffffc486`141e3030 ffffc486`141e2f88 : nt!KeBugCheckEx
ffffc486`141e2d10 fffff806`551d3810 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`5506f9f7 : nt!KiBugCheckDispatch+0x69
ffffc486`141e2e50 fffff806`551d1ba5 : 00000000`00000000 ffffffff`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc486`141e3030 fffff806`55102168 : fffff806`5738f5f5 ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 : nt!KiRaiseSecurityCheckFailure+0x325
ffffc486`141e31c8 fffff806`5738f5f5 : ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 ffffc486`141e32d0 : nt!RtlEnumerateEntryHashTable+0x108
ffffc486`141e31d0 fffff806`572af02e : 00000000`00000001 fffff806`5754a5f0 0000000a`5b27f540 fffff806`5754c4e8 : tcpip!Ipv4EnumerateAllPaths+0x515
ffffc486`141e3400 fffff806`62842acd : ffffaf8b`b546f000 00000000`00000070 00000000`00000000 0000000a`5b27f540 : NETIO!NsiEnumerateObjectsAllParametersEx+0x24e
ffffc486`141e35e0 fffff806`628426a2 : 00000000`00000000 ffffaf8b`b3c1a860 ffffaf8b`b3c1a790 0000000a`5b27f540 : nsiproxy!NsippEnumerateObjectsAllParameters+0x25d
ffffc486`141e37d0 fffff806`55031f79 : 00000000`00000002 00000000`00000000 ffffaf8b`b7248cc0 ffffaf8b`b036fd90 : nsiproxy!NsippDispatch+0x82
ffffc486`141e3820 fffff806`555e9785 : ffffaf8b`b3c1a790 00000000`00000000 00000000`00000000 ffffaf8b`b7248cc0 : nt!IofCallDriver+0x59
ffffc486`141e3860 fffff806`555e9590 : 00000000`00000000 00000000`00040800 ffffaf8b`b7248cc0 ffffc486`141e3b80 : nt!IopSynchronousServiceTail+0x1a5
ffffc486`141e3900 fffff806`555e8966 : 00000000`00000328 00000000`000007a4 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffffc486`141e3a20 fffff806`551d3351 : 00000000`00000000 00000000`00000000 00000000`000007a4 00000000`00000328 : nt!NtDeviceIoControlFile+0x56
ffffc486`141e3a90 00007ff9`c19fc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000000a`5b27f4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c19fc1a4


THREAD_SHA1_HASH_MOD_FUNC:  822778affbef63251f163b057b138fade7ad61e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b8230fae51530b9a4660a81c0335778f5ed33c84

THREAD_SHA1_HASH_MOD:  f9ed758f241911ea2ac48b03085dc96cd9ad2cdf

FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+24e
fffff806`572af02e 90              nop

FAULT_INSTR_CODE:  24448990

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  NETIO!NsiEnumerateObjectsAllParametersEx+24e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  24e

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx

TARGET_TIME:  2020-03-05T12:59:16.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3d7a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_netio!nsienumerateobjectsallparametersex

FAILURE_ID_HASH:  {96cf6644-d07a-eedc-6683-bcf08a6c06ba}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff83a1105f5850, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff83a11007867a, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff83a1105f5850

BUGCHECK_P2: 0

BUGCHECK_P3: ffff83a11007867a

BUGCHECK_P4: 2

READ_ADDRESS: fffff803271733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffff83a1105f5850

FAULTING_IP:
win32kbase!CInputThread::IsInputThreadDesktopActive+a
ffff83a1`1007867a 488b1dcfd11700  mov     rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)]

MM_INTERNAL_CODE:  2

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:12.0695

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff9b093dc71eb0 -- (.trap 0xffff9b093dc71eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff83c6c0628000
rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000
rip=ffff83a11007867a rsp=ffff9b093dc72040 rbp=ffff9b093dc72169
 r8=0000022c000004a0  r9=000000000000007e r10=000000000000002a
r11=ffff9b093dc721b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
win32kbase!CInputThread::IsInputThreadDesktopActive+0xa:
ffff83a1`1007867a 488b1dcfd11700  mov     rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)] ds:ffff83a1`101f5850=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80326e2dd34 to fffff80326dc2380

STACK_TEXT: 
ffff9b09`3dc71c08 fffff803`26e2dd34 : 00000000`00000050 ffff83a1`105f5850 00000000`00000000 ffff9b09`3dc71eb0 : nt!KeBugCheckEx
ffff9b09`3dc71c10 fffff803`26cc91bf : 00000000`00000020 00000000`00000000 00000000`00000000 ffff83a1`105f5850 : nt!MiSystemFault+0x195c84
ffff9b09`3dc71d10 fffff803`26dd0420 : ffff9b09`3dc71ef9 ffff9b09`3dc71f78 00000000`00000000 00000000`0000002b : nt!MmAccessFault+0x34f
ffff9b09`3dc71eb0 ffff83a1`1007867a : 00000000`00000000 ffff8807`9708a080 ffff8807`96934610 fffff803`26d0f43a : nt!KiPageFault+0x360
ffff9b09`3dc72040 ffff83a1`1016f63e : ffff83c6`c0628000 ffff9b09`3dc72080 ffff9b09`3dc72250 ffff83a1`10044499 : win32kbase!CInputThread::IsInputThreadDesktopActive+0xa
ffff9b09`3dc72070 ffff83a1`100db990 : 00000000`00000010 ffff9b09`3dc72020 fffff803`26d11920 ffff83a1`100443fe : win32kbase!CBaseProcessor::IsUMSuppressed+0xe
ffff9b09`3dc720a0 ffff83a1`100187a0 : 0000022c`00000498 ffff9b09`3dc72220 ffff83c6`c0628000 ffff9b09`3dc72330 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0x63914
ffff9b09`3dc721d0 ffff83a1`10173062 : 0000022c`000004a0 0000022c`00000498 ffff83c6`c37fe500 0000c98c`0000a419 : win32kbase!CMouseProcessor::ProcessMouseInputData+0x1a8
ffff9b09`3dc72250 ffff83a1`10167cf6 : ffff83c6`c06063f0 ffff8807`9708b070 00000000`00000018 ffff83c6`c06063f0 : win32kbase!CMouseProcessor::ProcessInput+0x43e
ffff9b09`3dc723e0 ffff83a1`1015a247 : ffff83a1`101b30e0 ffff9b09`3dc72520 ffff83c6`c06063f0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x56
ffff9b09`3dc72420 ffff83a1`100461a0 : 00000000`00000040 ffff83a1`101b30e0 00000000`00000001 fffff803`26d13f14 : win32kbase!CBaseInput::OnReadNotification+0x467
ffff9b09`3dc72560 ffff83a1`10045f02 : ffff9b09`40f26990 ffff83c6`c067c1a0 00000000`00000006 ffff7880`004a6dd3 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x290
ffff9b09`3dc726d0 ffff83a1`100455ce : 00000000`00000003 00000000`00002000 ffff83c6`c066f600 ffff83a1`101efb10 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffff9b09`3dc72700 ffff83a1`100453d2 : 00000000`00000006 00000000`00002000 00000000`00000006 fffff803`26d1109a : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffff9b09`3dc72730 ffff83a1`0ec368a8 : ffff83c6`c066f640 ffff83c6`c066f640 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x102
ffff9b09`3dc72860 ffff83a1`0ec364e3 : 00000000`00000004 00000000`00000004 00000000`0000000c ffff83a1`101f71e0 : win32kfull!xxxDesktopThreadWaiter+0x130
ffff9b09`3dc728e0 ffff83a1`1008582d : ffff8807`9708a080 ffff8807`9708a080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x403
ffff9b09`3dc729c0 ffff83a1`0ec4f4ef : ffff8807`9708a080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x22d
ffff9b09`3dc72ad0 fffff803`26dd4151 : ffff8807`9708a080 00000000`00000005 000001c2`7a2042b0 00000000`0000028c : win32kfull!NtUserCallNoParam+0x6f
ffff9b09`3dc72b00 00007fff`ffb01144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000b7`2583ff28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`ffb01144


THREAD_SHA1_HASH_MOD_FUNC:  4a4d29838be446952135e96f693969ec06e0b565

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  01475b698e0e89d2059db06da55e4b44e249aec9

THREAD_SHA1_HASH_MOD:  d058d017ac9ebd2d8032c5860845ca55c9d93b48

FOLLOWUP_IP:
win32kbase!CInputThread::IsInputThreadDesktopActive+a
ffff83a1`1007867a 488b1dcfd11700  mov     rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)]

FAULT_INSTR_CODE:  cf1d8b48

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  win32kbase!CInputThread::IsInputThreadDesktopActive+a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a

FAILURE_BUCKET_ID:  AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive

BUCKET_ID:  AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive

PRIMARY_PROBLEM_CLASS:  AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive

TARGET_TIME:  2020-03-24T22:21:28.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4c05

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_r_invalid_win32kbase!cinputthread::isinputthreaddesktopactive

FAILURE_ID_HASH:  {fe2722b0-fd80-54ed-048d-8810feb5f2b0}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff90de83bb2e3d, Address of the instruction which caused the bugcheck
Arg3: fffffa8a22abaec0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff90de83bb2e3d

BUGCHECK_P3: fffffa8a22abaec0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kbase!McTemplateK0pqqqq+19
ffff90de`83bb2e3d 4833c4          xor     rax,rsp

CONTEXT:  fffffa8a22abaec0 -- (.cxr 0xfffffa8a22abaec0)
rax=000012837a3beb80 rbx=ffff90b380654e10 rcx=ffff90b380654e10
rdx=ffff90de83c8b5e8 rsi=ffff90b380654e10 rdi=ffff90b380654e28
rip=ffff90de83bb2e3d rsp=fffffa8a22abb8b0 rbp=fffffa8a22abb919
 r8=000000000000000a  r9=ffff90b386792540 r10=ffff90de83b213a0
r11=fffffa8a22abba20 r12=fffff78000000004 r13=000000007fffffff
r14=ffff90b380654e40 r15=fffff78000000320
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
win32kbase!McTemplateK0pqqqq+0x19:
ffff90de`83bb2e3d 4833c4          xor     rax,rsp
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  NVIDIA Share.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:16.0383

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from ffff90de83b94b64 to ffff90de83bb2e3d

STACK_TEXT: 
fffffa8a`22abb8b0 ffff90de`83b94b64 : 00000000`7fffffff fffffa8a`22abba20 fffff801`0def4c00 ffff90b3`86792540 : win32kbase!McTemplateK0pqqqq+0x19
fffffa8a`22abb960 ffff90de`829191ad : ffff90b3`80654e10 00000000`00501802 ffff90b3`80c04c00 ffff90de`83ac5535 : win32kbase!EtwTraceInternalSetTimer+0x737c4
fffffa8a`22abb9b0 ffff90de`82918d6b : 00000000`0000000a ffff90b3`86792540 00000000`00000000 00000000`00000000 : win32kfull!InternalSetTimer+0x3ad
fffffa8a`22abba40 fffff801`0dfd4151 : ffffb384`0c12b6c0 fffffa8a`22abbb80 00000059`a31ff3f8 fffffa8a`22abbaa8 : win32kfull!NtUserSetTimer+0x11b
fffffa8a`22abba90 00007ffb`740413a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000059`a31ff3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`740413a4


THREAD_SHA1_HASH_MOD_FUNC:  5d12a6e25234cee3e5c80e162cf6253e0bd9fbc1

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ead9d563218ccc26e54a15f9212b020176ea7eb6

THREAD_SHA1_HASH_MOD:  7270be19cb526fd7decce7cf53041e4119fbf245

FOLLOWUP_IP:
win32kbase!McTemplateK0pqqqq+19
ffff90de`83bb2e3d 4833c4          xor     rax,rsp

FAULT_INSTR_CODE:  48c43348

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32kbase!McTemplateK0pqqqq+19

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .cxr 0xfffffa8a22abaec0 ; kb

BUCKET_ID_FUNC_OFFSET:  19

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!McTemplateK0pqqqq

BUCKET_ID:  0x3B_c0000005_win32kbase!McTemplateK0pqqqq

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_win32kbase!McTemplateK0pqqqq

TARGET_TIME:  2020-03-27T20:02:22.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4b05

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_win32kbase!mctemplatek0pqqqq

FAILURE_ID_HASH:  {04cfef4f-5244-5b8b-32a8-b121812ec784}

Followup:     MachineOwner
---------
 
Geçici bir süreliğine Avast kaldır.

Intel grafik birimi(Intel ekran kartı) sürücüsü neden yüklü?

Ağ sürücülerini güncelle.

Bellek ve HDD testini ne ile yaptın?

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8034489f58e, Address of the instruction which caused the bugcheck
Arg3: ffffc98265612dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8034489f58e

BUGCHECK_P3: ffffc98265612dd0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpCaptureHandleInformation+8e
fffff803`4489f58e 410fb64118      movzx   eax,byte ptr [r9+18h]

CONTEXT:  ffffc98265612dd0 -- (.cxr 0xffffc98265612dd0)
rax=0000000000000000 rbx=ffffe08da7c060a0 rcx=0000000000000000
rdx=0000000000000030 rsi=ffffe08da7c060a0 rdi=0000000000001028
rip=fffff8034489f58e rsp=ffffc982656137c8 rbp=ffffe08dacc57e40
r8=0000000000000000  r9=0000000000000000 r10=000000000018a3d0
r11=ffffc98265613810 r12=ffff9f7a73c00050 r13=ffffc982656138c0
r14=fffff8034489f500 r15=000000000032db48
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!ObpCaptureHandleInformation+0x8e:
fffff803`4489f58e 410fb64118      movzx   eax,byte ptr [r9+18h] ds:002b:00000000`00000018=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Steam.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:01.0851

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8034490cbe9 to fffff8034489f58e

STACK_TEXT:
ffffc982`656137c8 fffff803`4490cbe9 : 00000000`00001028 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e
ffffc982`656137d0 fffff803`4490a475 : fffff803`4489f500 ffffe08d`acc57e58 ffffc982`0032db48 00000000`0032db48 : nt!ExpSnapShotHandleTables+0x131
ffffc982`65613860 fffff803`447aa218 : 00000000`106db050 fffff803`00020000 ffffcb0b`0018a3d0 ffff9f7a`73c00050 : nt!ExpGetHandleInformation+0x71
ffffc982`656138b0 fffff803`445e150b : 00000000`0032db60 00000000`00000000 00000000`00000010 00000000`106db050 : nt!ExpQuerySystemInformation+0x1c8be8
ffffc982`65613ac0 fffff803`441d3251 : ffffcb0b`00000000 00000000`00000001 00000000`00000001 ffffc982`65613b80 : nt!NtQuerySystemInformation+0x2b
ffffc982`65613b00 00007ffe`d9b9c784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`092de2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d9b9c784


THREAD_SHA1_HASH_MOD_FUNC:  74d5022b6d70ac2b757be0cd92beda5707d667cf

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e28480b959efa983b7179027260dc7953695a1cf

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!ObpCaptureHandleInformation+8e
fffff803`4489f58e 410fb64118      movzx   eax,byte ptr [r9+18h]

FAULT_INSTR_CODE:  41b60f41

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpCaptureHandleInformation+8e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4f6eba0

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .cxr 0xffffc98265612dd0 ; kb

BUCKET_ID_FUNC_OFFSET:  8e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

BUCKET_ID:  0x3B_c0000005_nt!ObpCaptureHandleInformation

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpCaptureHandleInformation

TARGET_TIME:  2020-02-07T13:57:29.000Z

OSBUILD:  18362

OSSERVICEPACK:  592

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-08-22 03:24:00

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  34f7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpcapturehandleinformation

FAILURE_ID_HASH:  {744cd2bf-a795-9cd1-d425-97880ad655c5}

Followup:     MachineOwner
---------


CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff80823b9f6240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff80823b9f6240

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  svchost.exe

CRITICAL_PROCESS:  svchost.exe

EXCEPTION_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text>

ERROR_CODE: (NTSTATUS) 0x3b9c7080 - <Unable to get error code text>

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xEF

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:05.0401

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff806616cb1e9 to fffff80660fc1510

STACK_TEXT:
ffff9609`0d867938 fffff806`616cb1e9 : 00000000`000000ef ffff8082`3b9f6240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff9609`0d867940 fffff806`615c7893 : ffff8082`3b9f6240 fffff806`60e9c769 ffff8082`3b9f6240 fffff806`60e9c8c0 : nt!PspCatchCriticalBreak+0x115
ffff9609`0d8679e0 fffff806`6143a190 : ffff8082`00000000 00000000`00000000 ffff8082`3b9f6240 ffff8082`3b9f6240 : nt!PspTerminateAllThreads+0x175cbf
ffff9609`0d867a50 fffff806`61439f79 : ffffffff`ffffffff ffff9609`0d867b80 ffff8082`3b9f6240 fffff806`61154301 : nt!PspTerminateProcess+0xe0
ffff9609`0d867a90 fffff806`60fd3351 : 0000007b`00000414 ffff8082`3b9c7080 ffff8082`3b9f6240 00000000`00000000 : nt!NtTerminateProcess+0xa9
ffff9609`0d867b00 00007ffe`dbdfc644 : 00007ffe`dbdccef2 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000007b`86eff778 00007ffe`dbdccef2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdfc644
0000007b`86eff780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`dbdccef2


THREAD_SHA1_HASH_MOD_FUNC:  e8c9407148d94b0ae6496e94a8a56eccd3d66cf5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  379d05474c8eb0dc5e34b0f2c3904c1f681e675d

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PspCatchCriticalBreak+115
fffff806`616cb1e9 cc              int     3

FAULT_INSTR_CODE:  ed8440cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak

BUCKET_ID:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak

PRIMARY_PROBLEM_CLASS:  0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_3b9c7080_nt!PspCatchCriticalBreak

TARGET_TIME:  2020-03-03T14:43:12.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  c23

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xef_svchost.exe_bugcheck_critical_process_3b9c7080_nt!pspcatchcriticalbreak

FAILURE_ID_HASH:  {c7ccb047-8cac-abab-d6dd-0041765eac8c}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc486141e3030, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc486141e2f88, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc486141e3030

BUGCHECK_P3: ffffc486141e2f88

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc486141e3030 -- (.trap 0xffffc486141e3030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf8bb3e89e40 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffaf8bb0cdc210 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80655102168 rsp=ffffc486141e31c8 rbp=ffffc486141e32d0
r8=000000000000008e  r9=ffffaf8bb0c98e40 r10=000000000000010e
r11=00000000000000e1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlEnumerateEntryHashTable+0x108:
fffff806`55102168 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc486141e2f88 -- (.exr 0xffffc486141e2f88)
ExceptionAddress: fffff80655102168 (nt!RtlEnumerateEntryHashTable+0x0000000000000108)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:09.0089

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff806551d33e9 to fffff806551c1510

STACK_TEXT:
ffffc486`141e2d08 fffff806`551d33e9 : 00000000`00000139 00000000`00000003 ffffc486`141e3030 ffffc486`141e2f88 : nt!KeBugCheckEx
ffffc486`141e2d10 fffff806`551d3810 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`5506f9f7 : nt!KiBugCheckDispatch+0x69
ffffc486`141e2e50 fffff806`551d1ba5 : 00000000`00000000 ffffffff`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc486`141e3030 fffff806`55102168 : fffff806`5738f5f5 ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 : nt!KiRaiseSecurityCheckFailure+0x325
ffffc486`141e31c8 fffff806`5738f5f5 : ffffaf8b`b3a8e040 ffffaf8b`b062bd70 ffffaf8b`b062b8e0 ffffc486`141e32d0 : nt!RtlEnumerateEntryHashTable+0x108
ffffc486`141e31d0 fffff806`572af02e : 00000000`00000001 fffff806`5754a5f0 0000000a`5b27f540 fffff806`5754c4e8 : tcpip!Ipv4EnumerateAllPaths+0x515
ffffc486`141e3400 fffff806`62842acd : ffffaf8b`b546f000 00000000`00000070 00000000`00000000 0000000a`5b27f540 : NETIO!NsiEnumerateObjectsAllParametersEx+0x24e
ffffc486`141e35e0 fffff806`628426a2 : 00000000`00000000 ffffaf8b`b3c1a860 ffffaf8b`b3c1a790 0000000a`5b27f540 : nsiproxy!NsippEnumerateObjectsAllParameters+0x25d
ffffc486`141e37d0 fffff806`55031f79 : 00000000`00000002 00000000`00000000 ffffaf8b`b7248cc0 ffffaf8b`b036fd90 : nsiproxy!NsippDispatch+0x82
ffffc486`141e3820 fffff806`555e9785 : ffffaf8b`b3c1a790 00000000`00000000 00000000`00000000 ffffaf8b`b7248cc0 : nt!IofCallDriver+0x59
ffffc486`141e3860 fffff806`555e9590 : 00000000`00000000 00000000`00040800 ffffaf8b`b7248cc0 ffffc486`141e3b80 : nt!IopSynchronousServiceTail+0x1a5
ffffc486`141e3900 fffff806`555e8966 : 00000000`00000328 00000000`000007a4 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffffc486`141e3a20 fffff806`551d3351 : 00000000`00000000 00000000`00000000 00000000`000007a4 00000000`00000328 : nt!NtDeviceIoControlFile+0x56
ffffc486`141e3a90 00007ff9`c19fc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
0000000a`5b27f4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c19fc1a4


THREAD_SHA1_HASH_MOD_FUNC:  822778affbef63251f163b057b138fade7ad61e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b8230fae51530b9a4660a81c0335778f5ed33c84

THREAD_SHA1_HASH_MOD:  f9ed758f241911ea2ac48b03085dc96cd9ad2cdf

FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+24e
fffff806`572af02e 90              nop

FAULT_INSTR_CODE:  24448990

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  NETIO!NsiEnumerateObjectsAllParametersEx+24e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  24e

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_NETIO!NsiEnumerateObjectsAllParametersEx

TARGET_TIME:  2020-03-05T12:59:16.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3d7a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_netio!nsienumerateobjectsallparametersex

FAILURE_ID_HASH:  {96cf6644-d07a-eedc-6683-bcf08a6c06ba}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff83a1105f5850, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff83a11007867a, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff83a1105f5850

BUGCHECK_P2: 0

BUGCHECK_P3: ffff83a11007867a

BUGCHECK_P4: 2

READ_ADDRESS: fffff803271733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff83a1105f5850

FAULTING_IP:
win32kbase!CInputThread::IsInputThreadDesktopActive+a
ffff83a1`1007867a 488b1dcfd11700  mov     rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)]

MM_INTERNAL_CODE:  2

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:12.0695

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff9b093dc71eb0 -- (.trap 0xffff9b093dc71eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff83c6c0628000
rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000
rip=ffff83a11007867a rsp=ffff9b093dc72040 rbp=ffff9b093dc72169
r8=0000022c000004a0  r9=000000000000007e r10=000000000000002a
r11=ffff9b093dc721b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
win32kbase!CInputThread::IsInputThreadDesktopActive+0xa:
ffff83a1`1007867a 488b1dcfd11700  mov     rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)] ds:ffff83a1`101f5850=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80326e2dd34 to fffff80326dc2380

STACK_TEXT:
ffff9b09`3dc71c08 fffff803`26e2dd34 : 00000000`00000050 ffff83a1`105f5850 00000000`00000000 ffff9b09`3dc71eb0 : nt!KeBugCheckEx
ffff9b09`3dc71c10 fffff803`26cc91bf : 00000000`00000020 00000000`00000000 00000000`00000000 ffff83a1`105f5850 : nt!MiSystemFault+0x195c84
ffff9b09`3dc71d10 fffff803`26dd0420 : ffff9b09`3dc71ef9 ffff9b09`3dc71f78 00000000`00000000 00000000`0000002b : nt!MmAccessFault+0x34f
ffff9b09`3dc71eb0 ffff83a1`1007867a : 00000000`00000000 ffff8807`9708a080 ffff8807`96934610 fffff803`26d0f43a : nt!KiPageFault+0x360
ffff9b09`3dc72040 ffff83a1`1016f63e : ffff83c6`c0628000 ffff9b09`3dc72080 ffff9b09`3dc72250 ffff83a1`10044499 : win32kbase!CInputThread::IsInputThreadDesktopActive+0xa
ffff9b09`3dc72070 ffff83a1`100db990 : 00000000`00000010 ffff9b09`3dc72020 fffff803`26d11920 ffff83a1`100443fe : win32kbase!CBaseProcessor::IsUMSuppressed+0xe
ffff9b09`3dc720a0 ffff83a1`100187a0 : 0000022c`00000498 ffff9b09`3dc72220 ffff83c6`c0628000 ffff9b09`3dc72330 : win32kbase!CMouseProcessor::CommitMousePosAndMoveCursor+0x63914
ffff9b09`3dc721d0 ffff83a1`10173062 : 0000022c`000004a0 0000022c`00000498 ffff83c6`c37fe500 0000c98c`0000a419 : win32kbase!CMouseProcessor::ProcessMouseInputData+0x1a8
ffff9b09`3dc72250 ffff83a1`10167cf6 : ffff83c6`c06063f0 ffff8807`9708b070 00000000`00000018 ffff83c6`c06063f0 : win32kbase!CMouseProcessor::ProcessInput+0x43e
ffff9b09`3dc723e0 ffff83a1`1015a247 : ffff83a1`101b30e0 ffff9b09`3dc72520 ffff83c6`c06063f0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x56
ffff9b09`3dc72420 ffff83a1`100461a0 : 00000000`00000040 ffff83a1`101b30e0 00000000`00000001 fffff803`26d13f14 : win32kbase!CBaseInput::OnReadNotification+0x467
ffff9b09`3dc72560 ffff83a1`10045f02 : ffff9b09`40f26990 ffff83c6`c067c1a0 00000000`00000006 ffff7880`004a6dd3 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x290
ffff9b09`3dc726d0 ffff83a1`100455ce : 00000000`00000003 00000000`00002000 ffff83c6`c066f600 ffff83a1`101efb10 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffff9b09`3dc72700 ffff83a1`100453d2 : 00000000`00000006 00000000`00002000 00000000`00000006 fffff803`26d1109a : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffff9b09`3dc72730 ffff83a1`0ec368a8 : ffff83c6`c066f640 ffff83c6`c066f640 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x102
ffff9b09`3dc72860 ffff83a1`0ec364e3 : 00000000`00000004 00000000`00000004 00000000`0000000c ffff83a1`101f71e0 : win32kfull!xxxDesktopThreadWaiter+0x130
ffff9b09`3dc728e0 ffff83a1`1008582d : ffff8807`9708a080 ffff8807`9708a080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x403
ffff9b09`3dc729c0 ffff83a1`0ec4f4ef : ffff8807`9708a080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x22d
ffff9b09`3dc72ad0 fffff803`26dd4151 : ffff8807`9708a080 00000000`00000005 000001c2`7a2042b0 00000000`0000028c : win32kfull!NtUserCallNoParam+0x6f
ffff9b09`3dc72b00 00007fff`ffb01144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000b7`2583ff28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`ffb01144


THREAD_SHA1_HASH_MOD_FUNC:  4a4d29838be446952135e96f693969ec06e0b565

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  01475b698e0e89d2059db06da55e4b44e249aec9

THREAD_SHA1_HASH_MOD:  d058d017ac9ebd2d8032c5860845ca55c9d93b48

FOLLOWUP_IP:
win32kbase!CInputThread::IsInputThreadDesktopActive+a
ffff83a1`1007867a 488b1dcfd11700  mov     rbx,qword ptr [win32kbase!gpInputThread (ffff83a1`101f5850)]

FAULT_INSTR_CODE:  cf1d8b48

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  win32kbase!CInputThread::IsInputThreadDesktopActive+a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a

FAILURE_BUCKET_ID:  AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive

BUCKET_ID:  AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive

PRIMARY_PROBLEM_CLASS:  AV_R_INVALID_win32kbase!CInputThread::IsInputThreadDesktopActive

TARGET_TIME:  2020-03-24T22:21:28.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4c05

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_r_invalid_win32kbase!cinputthread::isinputthreaddesktopactive

FAILURE_ID_HASH:  {fe2722b0-fd80-54ed-048d-8810feb5f2b0}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff90de83bb2e3d, Address of the instruction which caused the bugcheck
Arg3: fffffa8a22abaec0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff90de83bb2e3d

BUGCHECK_P3: fffffa8a22abaec0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
win32kbase!McTemplateK0pqqqq+19
ffff90de`83bb2e3d 4833c4          xor     rax,rsp

CONTEXT:  fffffa8a22abaec0 -- (.cxr 0xfffffa8a22abaec0)
rax=000012837a3beb80 rbx=ffff90b380654e10 rcx=ffff90b380654e10
rdx=ffff90de83c8b5e8 rsi=ffff90b380654e10 rdi=ffff90b380654e28
rip=ffff90de83bb2e3d rsp=fffffa8a22abb8b0 rbp=fffffa8a22abb919
r8=000000000000000a  r9=ffff90b386792540 r10=ffff90de83b213a0
r11=fffffa8a22abba20 r12=fffff78000000004 r13=000000007fffffff
r14=ffff90b380654e40 r15=fffff78000000320
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
win32kbase!McTemplateK0pqqqq+0x19:
ffff90de`83bb2e3d 4833c4          xor     rax,rsp
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: d40

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  NVIDIA Share.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  04-03-2020 01:27:16.0383

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from ffff90de83b94b64 to ffff90de83bb2e3d

STACK_TEXT:
fffffa8a`22abb8b0 ffff90de`83b94b64 : 00000000`7fffffff fffffa8a`22abba20 fffff801`0def4c00 ffff90b3`86792540 : win32kbase!McTemplateK0pqqqq+0x19
fffffa8a`22abb960 ffff90de`829191ad : ffff90b3`80654e10 00000000`00501802 ffff90b3`80c04c00 ffff90de`83ac5535 : win32kbase!EtwTraceInternalSetTimer+0x737c4
fffffa8a`22abb9b0 ffff90de`82918d6b : 00000000`0000000a ffff90b3`86792540 00000000`00000000 00000000`00000000 : win32kfull!InternalSetTimer+0x3ad
fffffa8a`22abba40 fffff801`0dfd4151 : ffffb384`0c12b6c0 fffffa8a`22abbb80 00000059`a31ff3f8 fffffa8a`22abbaa8 : win32kfull!NtUserSetTimer+0x11b
fffffa8a`22abba90 00007ffb`740413a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000059`a31ff3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`740413a4


THREAD_SHA1_HASH_MOD_FUNC:  5d12a6e25234cee3e5c80e162cf6253e0bd9fbc1

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ead9d563218ccc26e54a15f9212b020176ea7eb6

THREAD_SHA1_HASH_MOD:  7270be19cb526fd7decce7cf53041e4119fbf245

FOLLOWUP_IP:
win32kbase!McTemplateK0pqqqq+19
ffff90de`83bb2e3d 4833c4          xor     rax,rsp

FAULT_INSTR_CODE:  48c43348

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32kbase!McTemplateK0pqqqq+19

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .cxr 0xfffffa8a22abaec0 ; kb

BUCKET_ID_FUNC_OFFSET:  19

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!McTemplateK0pqqqq

BUCKET_ID:  0x3B_c0000005_win32kbase!McTemplateK0pqqqq

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_win32kbase!McTemplateK0pqqqq

TARGET_TIME:  2020-03-27T20:02:22.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4b05

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_win32kbase!mctemplatek0pqqqq

FAILURE_ID_HASH:  {04cfef4f-5244-5b8b-32a8-b121812ec784}

Followup:     MachineOwner
---------

Bellekleri Windows Bellek Tanıma aracı ile test ettim.

HDD ise HD Tune Pro ile test ettim.
 

Technopat Haberler

Geri
Yukarı